Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750885AbWBZAyg (ORCPT ); Sat, 25 Feb 2006 19:54:36 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750906AbWBZAyg (ORCPT ); Sat, 25 Feb 2006 19:54:36 -0500 Received: from outpipe-village-512-1.bc.nu ([81.2.110.250]:39059 "EHLO lxorguk.ukuu.org.uk") by vger.kernel.org with ESMTP id S1750880AbWBZAyf (ORCPT ); Sat, 25 Feb 2006 19:54:35 -0500 Subject: Re: [Announce] Intel PRO/Wireless 3945ABG Network Connection From: Alan Cox To: Christoph Hellwig Cc: James Ketrenos , NetDev , linux-kernel@vger.kernel.org, okir@suse.de In-Reply-To: <20060225084139.GB22109@infradead.org> References: <43FF88E6.6020603@linux.intel.com> <20060225084139.GB22109@infradead.org> Content-Type: text/plain Content-Transfer-Encoding: 7bit Date: Sun, 26 Feb 2006 00:58:02 +0000 Message-Id: <1140915482.23286.6.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Evolution 2.2.3 (2.2.3-2.fc4) Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1347 Lines: 31 On Sad, 2006-02-25 at 08:41 +0000, Christoph Hellwig wrote: > the regualatory problems are not true. They are although the binary interpretation isn't AFAIK from law but from lawyers. The same is actually true in much of the EU. The actual requirement is that the transmitting device must be reasonably tamperproof. Some of the lawyers have decided that for a software radio tamperproof means "binary". Thats pretty dumb but given the hardware variant of this is "seal anything adjustible in plastic gunge" you can see the logic at work - and it *will* help make the product tamperproof to end users. Remember Christoph you are not an "end user" any more than hardware like that is designed to proof against a person who can use a scope and solder surface mount components. Now a smart vendor would have put MD5 sum checking into the chip so you can only load register sets for the transmitter as a block and that block is loaded such that [Data] + Secret known only to chip = MD5sum with data or a similar cookie signing scheme. Replay attacks don't matter here so that should be sufficient. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/